SITE AND ALARM PRIORITIZATION SYSTEM

Information

  • Patent Application
  • 20110298608
  • Publication Number
    20110298608
  • Date Filed
    June 02, 2010
    14 years ago
  • Date Published
    December 08, 2011
    13 years ago
Abstract
An approach for site prioritization and then a review and prioritization of the alarms at the site. A feature may to first find the site most in need of attention and then check the alarms of that site. A rule algorithm may determine a prioritization of site according to primitive rules which can be customized and modified nearly at any time making site priority a dynamic determination. At the site, the alarms may be ordered by criticality.
Description
BACKGROUND

The invention pertains to alarms and particularly to alarm management. More particularly, the invention pertains to prioritization as it relates to alarm management


SUMMARY

The invention is an approach for site prioritization and then a review and prioritization of the alarms at the site. A feature may be to first find the site most in need of attention and then check the alarms at the site. A rule algorithm may determine a prioritization of site according to primitive rules which can be customized and modified nearly at any time making site priority a dynamic determination. The alarms may be ordered by criticality at the site.





BRIEF DESCRIPTION OF THE DRAWING


FIG. 1 is a diagram of a basis for primitive rules for a priority determination;



FIG. 2 is a block diagram of the present approach;



FIG. 3 is a diagram of a screen shot of display showing a site list and alarm statistics; and



FIG. 4 is a block diagram showing a site based alarm management workflow.





DESCRIPTION

The present approach may stem from a need to manage and control the site portfolio and increase or decrease the priority of the site based on service level agreements. Some alarm management systems may concentrate deeply on prioritization of alarms, but fail to do the same with respect to the site and the actual system topology. Such systems may lack the ability to decipher and bring attention to the most critical site that needs immediate attention. A small site with few alarms and few modules may require faster attention and more importance then a large site with one item in alarm.


An objective of the present approach may be finding the site most in need of attention, not the highest priority, most persistent, or most ignored individual alarm. There appears to be a demanding need for a rule-based algorithm that is highly flexible and configurable to prioritize the site based on site level data, attributes and the alarm statistics. The algorithm may also need to be based on the continuous alarm patterns for defining the site priority and help in site diagnostics, continuous service, and monitoring and predicting equipment failures at the site. This approach may be regarded as smart site prioritization algorithm for dynamically enhancing the criticality and urgency level of a site, based on site attributes and alarm statistics.


A goal of the present approach is to avoid catastrophic failures at the site through prompt execution of the remedial actions, and to improve the overall operation of the facility, by categorizing the site based on criticality and presenting a site-based alarm management view for immediate and efficient action.


The present approach may relate to an algorithm for using information about alarm statistics at the site, a pattern of alarms at the site, and the site attributes to define and configure priority rules to raise or decrease the level of urgency at the site. A store criticality and urgency may be dependent on numerous attributes, and the varying nature of these attributes may make a site priority dynamic (e.g., a gift store may become a critical site during holidays, otherwise it can be of low priority). A rule algorithm should consider these dynamics at the site, and be aimed at providing efficient filtering options which can meet these demanding natures.


The rules may be customized and modified at any point of time with the changing alarm pattern and some times even due to the changing service level agreement. A service level agreement may sometimes indicate which sites need the most attention.


A rule algorithm may be based on key primitive rules which can be predefined. The system may accommodate adding new primitive rules or attributes at run time for creating the prioritization rules, but would necessarily be limited to those items. As illustrated with a diagram of an example in FIG. 1, the basis 40 of key primitive rules may be site level attributes 41, alarm statistics 42, equipment type and statistics 43, alarm pattern 44, date and time information 45; a service level agreement 46; and urgency.


Site level attributes 41 may involve site location, weather data at the site, site area, site type, and site occupied versus non-occupied time.


Alarm statistics 42 may incorporate the number of unacknowledged alarms, the number of acknowledged alarms, the number of unresolved alarms, the number of escalated alarms, the number of high priority alarms, the number of medium priority alarms, the number of low priority alarms, the last critical alarm, and the latest occurred time of an alarm.


Equipment type and statistics 43 may incorporate a number of modules at the site; the type of equipment at the site (e.g., HVAC/lighting/refrigeration), and health of the equipment.


An alarm pattern 44 may incorporate a number of critical alarms in the past 1 week/1 month, a number of nuisance alarms in the past 1 week/1 month, and a number of alarms grouped by modules at the site in the past 1 week/1 month.


Date and time information 45 may incorporate the day of the week (weekend/week days), the holiday season versus the non-holiday season, and the season (i.e., summer, fall, winter, or spring).


Based on the above attributes, a monitoring group may create rules which can prioritize the sites across the enterprises of a system.


The present approach may set the priority of the site coupled with a site list view of the filters and the routing group may display the ordered list of sites in the operator's console with a site needing most immediate attention at the top of the list. The system may then allow the operator to configure a default ordering of the site list view, and prioritize the work based on its own ease and use cases. This may vastly improve the operator's alarm management statistics.


The present approach may provide a quick inherent display of the current alarm statistics at various sites across the globe, which could assist the operator in making a logical decision for the alarm mitigation and management activities. The present approach may help foster ties between the alarm and the site, which combined with the site list order, augmented with default site ordering to place the most important and critical site at the top of the list, would vastly improve operator statistics and the cycle time.


The present approach may take alarm management to a higher level, where rather than prioritizing each and every alarm and event, an algorithm may prioritize a facility or site as a whole.


The present approach may be different from other approaches in that the algorithm can do all the analyses for the operator and direct the operator to the site which needs immediate attention, which would vastly reduce the cycle time of alarm management and give the operator ample time to be online with the site and monitor the health of the site.


The following definitions may be used in the present description. An “alarm group” may refer to an organization of alarms into a logical set. “Alarm routing” may involve using pre-determined algorithms and information about the current system state (i.e., responsibility, logged-in operators, workload, escalation conditions, and so forth) and automatically assign an alarm or alarms to a specific operator or group of operators for follow-through. A “rule engine” may be an intuitive user interface, for creating rules for alarm management and system configuration. An “enterprise model” may be a comprehensive specification of information that describes the entities in a typical and monitored enterprise in a hierarchical structure representing the scope of control. A “filter” may incorporate a set of parameters that define the items of interest from a larger set of items, by specifying terms to include or to exclude from a specified set of data points. Filters may affect the display of alarm records to the end user. “Nuisance alarms” may be alarms that are perceived to have no value in the overall management of a facility, based on criteria to be set and managed by operations personnel, including administrators and alarm console operators.


The details of the present approach may incorporate the following items as shown in FIG. 2. A privileged user with rights to create site priority rule logs into the system at symbol 51; 2) A user navigating to the screen for creating site priority rules at symbol 52; 3) A privileged user creating the priority rule using friendly and easy to use rule wizard based on the predefined primitive rules at symbol 53; 4) A privileged user assigning priority to all the sites across all the enterprises in the system at symbol 54; 5) An overlapping priority at the sites being handled by the algorithm which will assign the maximum priority to a site at symbol 55; 6) A privileged operator logging into the system with the right to view alarms and the site list at symbol 56; 7) An operator selecting filters from a routing group or ad hoc filters at symbol 57; and 8) An operator's console getting filled by all the sites and the alarm statistics at the sites scoped by the filter or the routing group that the operator has selected at symbol 58.


The present approach may further incorporate the following items: 9) Sites ordered based on the level of urgency and criticality of the site, which can be handled by a default sort ordering algorithm at symbol 59; 10) A quick inherent display of the site at the top of list, helping an operator in making a quick choice about which site needs to be dialed in at symbol 60; 11) A operator silencing the alarm at the site by taking appropriate action, including action on the alarm in the alarm management system as well at symbol 61; 12) The background thread re-evaluating the priority of the site by re-evaluating the site priority rules at symbol 62; 13) Re-evaluating priority rules that pull the last acted upon site from the top of the list and ideally with that site going to the bottom at the list at symbol 63; 14) This evaluation in turn bringing the next most critical and urgent site to the top of the list at symbol 64; and 15) The system providing a mechanism for modifying priority rules, and copying priority across a customer at symbol 65.


The following view details how the alarm information may be presented in a more condensed way by summarizing the alarm statistics and displaying the site-based alarm view. The view may allow the operator to take immediate action for the alarm which is at the top of the list for the respective site, as the site prioritization algorithm has already evaluated the criticality of all the sites across enterprises, and placed the site which needs immediate attention at the top of the list.



FIG. 3 is a diagram showing a screen shot 11 of a site list of groups/filters. A list 12 of sites in alarms may be ordered by criticality of the alarms at the respective site. On screen shot 11, alarm statistics at the site may be ordered by criticality at the site. Column 14 shows the locations of the various sites. Column 15 shows the site number of the respective location. These sites may be, for example, various stores of a large national chain. Screen shot 11 shows a site list of a last one day alarm and shows an alarm view of each site with such an alarm.


A flowchart may show the various steps involved in a site based alarm management strategy. FIG. 4 is a diagram of a site based alarm management workflow system. The items of the system are indicated in symbols labeled generally in a numerical order. After a start 21 and a privileged operator logging in the system and navigating to the alarm console at symbol 22, the operator may select a routing role (group) or filters from a filter list at symbol 23. At symbol 24, a site list view of the group or the filters may be displayed. The operator may select a most critical site from the list based on alarm statistics and urgency at symbol 25. All the alarms from the site may be displayed in a user view ordered by priority and a logged time stamp at symbol 26. The site may be added to the operator's recently visited site filter for future references at symbol 27. At symbol 28, the operator may acknowledge all the alarms at the site. The operator may get online with the site at symbol 29. The operator may evaluate all the alarms at the site and clear the alarms at symbol 30. A question at symbol 31 may be whether there is any critical alarm open at the site. If the answer is “yes”, then the operator may evaluate all the alarms at the site and clear the critical alarm at symbol 30. If the answer is “no”, then the operator may resolve all the alarms at the site with proper resolution and diagnosis at symbol 32. At symbol 33, the operator may select a switch to a previous filter. At symbol 34, the operator may go back to the site view of the group or filter that the operator has previously selected. A question, whether there are any sites in an alarm status, may be asked at symbol 35. If the answer is “yes”, then the actions at symbols 25-34 may be repeated. If the answer is “no”, then the workflow may stop at symbol 36.


In the present specification, some of the matter may be of a hypothetical or prophetic nature although stated in another manner or tense.


Although the present system has been described with respect to at least one illustrative example, many variations and modifications will become apparent to those skilled in the art upon reading the specification. It is therefore the intention that the appended claims be interpreted as broadly as possible in view of the prior art to include all such variations and modifications.

Claims
  • 1. A site prioritization approach comprising: providing a filter having a priority scenario;applying the filter to a system of sites to arrange the sites into a list according to the priority scenario applying an order of priority with a site having a highest priority at a top of the list;doing an alarm review of the site at the top of the list to select out any existing active alarm or alarms of the site;silencing the existing active alarm or alarms by taking appropriate action; andre-evaluating a priority of the site having the active alarm or alarms which were silenced; andwherein re-evaluating the priority pulls the last acted upon site having no longer an active alarm from the top of the list and places the site lower in the list.
  • 2. The approach of claim 1, further comprising doing an alarm review of another site at the top of the list.
  • 3. The approach of claim 1, wherein the priority scenario is created from predefined primitive rules.
  • 4. The approach of claim 1, wherein the order of priority is according to a level of urgency and criticality.
  • 5. The approach of claim 4, wherein the order of priority is provided by a sort-ordering algorithm.
  • 6. The approach of claim 1, wherein the filter is selected from a routing group or ad hoc filters.
  • 7. The approach of claim 3, wherein a background thread re-evaluates the priority of a site having the alarm or alarms silenced, by re-evaluating the predefined primitive rules.
  • 8. The approach of claim 3, wherein an overlapping priority of numerous sites in the list is resolved by a priority algorithm which selects and assigns a maximum priority to just one of the numerous sites.
  • 9. The approach of claim 3, wherein the predefined primitive rules are based on: site level attributes;alarm statistics;alarm patterns;equipment data;date and time information;a service level agreement; and/orurgency.
  • 10. The approach of claim 9, wherein site level attributes comprise: site location;site weather data;site area;site type; and/orsite occupied versus non-occupied time.
  • 11. The approach of claim 9, wherein alarm statistics comprise: a number of unacknowledged alarms;a number of acknowledged alarms;a number of unresolved alarms;a number of escalated alarmsa number of high priority alarms;a number of medium priority alarms;a number of low priority alarms;a last critical alarm; and/ora latest occurred time of an alarm.
  • 12. The approach of claim 9, wherein equipment data comprise: a number of equipment modules at a site;a type of equipment at the site; and/orhealth of the equipment.
  • 13. The approach of claim 9, wherein alarm patterns comprise: a number of critical alarms in a given past period of time;a number of nuisance alarms in a given past period of time; and/ora number of alarms grouped by modules at a site in a given past period of time.
  • 14. The approach of claim 9, wherein date and time information comprise: a day in a week;a holiday season or non-holiday season;a spring, summer, fall or winter season; and/ora time of day.
  • 15. A site and alarm management system comprising: a routing group or filter selected from a list of groups and filters, by a first selection algorithm;a site list resulting from application of the routing group or filter to a portfolio of sites;a most critical site at top of the site list, wherein the most critical site is selected by a second selection algorithm; andalarms from the most critical site, listed in an order by a third selection algorithm, are evaluated and active alarms are cleared, resulting in the most critical site being no longer the most critical site on the site list.
  • 16. The system of claim 15, further comprising another most critical site on the site list treated in a similar manner as a previous most critical site.
  • 17. The system of claim 16, wherein: the second selection algorithm selects the most critical site according to alarm statistics and urgency;the third selection algorithm lists the alarms from the most critical site in the order according to a priority and logged time stamp; andthe active alarms are cleared with diagnosis and resolution.
  • 18. A site prioritization mechanism comprising: a filter;a site list resulting from an application of the filter to sites in a system;a most critical site placed at a top of the site list is selected according to primitive rules; andalarms from the most critical site are listed according to an order, wherein active alarms of the site are cleared, resulting in the most critical site being no longer the most critical site being at the top of the site list.
  • 19. The mechanism of claim 18, further comprising; any subsequent most critical site selected from the top of the site list; andalarms from the any subsequent most critical site are listed according to an order, wherein active alarms of the site are cleared, resulting in the any subsequent most critical site being no longer the most critical site being at the top of the site list.
  • 20. The mechanism of claim 19, wherein: primitive rules are based on: site level attributes;alarm statistics;alarm patterns;equipment data;date and time information;a service level agreement; and/orurgency;the order is based on priority and a logged time stamp; andactive alarms are cleared with diagnosis and resolution.